The Android malware tracked as BRATA has been updated with new features that grants it the ability to record keystrokes, track device locations, and even perform a factory reset in an apparent bid to cover up fraudulent wire transfers.
The latest variants, detected late last year, are said to be distributed through a downloader to avoid being detected by security software, Italian cybersecurity firm Cleafy said in a technical write-up. Targets include banks and financial institutions in the U.K., Poland, Italy, and Latin America.
“What makes Android RAT so interesting for attackers is its capability to operate directly on the victim devices instead of using a new device,” Cleafy researchers noted in December 2021. “By doing so, Threat Actors (TAs) can drastically reduce the possibility of being flagged ‘as suspicious’, since the device’s fingerprinting is already known to the bank.”
First seen in the wild at the end of 2018 and short for “Brazilian Remote Access Tool Android,” BRATA initially targeted users in Brazil and then rapidly evolved into a feature-packed banking trojan. Over the years, the malware has received numerous upgrades and changes, while also posing as security scanner apps to elude detection.
BRATA is spread via smishing messages that impersonate a bank and contain a link to a malicious website, where the victim is tricked into downloading an anti-spam app. The scammers then call the target and employ social engineering schemes to persuade the user to install the trojan app and grant it overly-intrusive permissions.
images from Hacker News